Cryptographic Identity
Protection

Quantum Proof-of-Stake (qPoS)

Stealth plans to be the fastest cryptographically private digital currency possible. The goal is to provide almost instant transactions with absolute privacy protection using state of the art cryptography combined with streamlined blockchain execution. The technology we are developing is called Quantum Proof-of-Stake (qPoS).

Privacy is Critical for Digital Currencies

Contrary to popular understanding, first generation cryptocurrencies like Bitcoin offer no true privacy protection. The entire Bitcoin blockchain ledger is public, meaning all transactions between all accounts on the blockchain can be inspected by anyone.

Relationships between addresses can be inferred, social networks can be reconstructed and individual identities can even be determined using big data analytical techniques. Companies and cyber criminals can determine individual spending habits, sell what should be private information or design personalized hacks that target specific people.

The bottom line is that even though mainstream media would claim otherwise, Bitcoin and almost all other cryptocurrencies offer nothing close to the kind of privacy that individuals have come to expect from traditional payment systems, like credit cards, wire transfers and cash.

Speed is Critical for Digital Currencies

Presently, the most used digital currency is Bitcoin, which enjoys massive market dominance simply because it was the first technically viable cryptocurrency. Despite having this so-called first mover advantage, Bitcoin is a slow design that uses energy intensive mining to reach consensus.

Two problems with Bitcoin’s inefficiency are that slow and irregular confirmation times do not fit well for point-of-sale purchases and can lead to frustration for online payments. For example, payments may not be confirmed by mining before the merchant nullifies an order for nonpayment.

This poses risks for both merchants and consumers. It also inconveniences honest merchants who must either refund failed purchases or process purchases manually, while assuming the risk of Bitcoin price swings between payment and processing.

Using a Fused Ledger to Improve Privacy, Speed and Throughput

Stealth qPoS fuses two different types of blockchain ledgers, each with different strengths, to take advantage of both. The first kind of ledger uses what are known as unspent transaction outputs (UTXOs), that can be thought of as digital traveler’s cheques. Although the reasons are highly technical, a UTXO ledger allows for the addition of cryptographic privacy, hiding both sender and receiver of every transaction on the blockchain. All person-to-person transactions on the Stealth blockchain will use this cryptographically private UTXO ledger. The second kind of ledger is account-based and is used for transaction confirmation. Account-based ledgers can be highly efficient, leading to extremely precise scheduling of block validation through a round-robin proof-of-stake mechanism.

Each validator is assigned a short quantum of time to validate transactions, hence the name Quantum Proof-of-Stake (qPoS). Validators are rewarded for each block of transactions they process and they can transfer these rewards to the cryptographically private UTXO ledger after accumulating enough rewards on the account-based ledger. Validators must buy their rights to validate transactions and are rewarded based on performance, making qPoS not only highly efficient, but also based purely on free market economics.

Quantum Proof-of-Stake (qPoS) Brochure PDF

Quantum Proof-of-Stake (qPoS) Whitepaper

TOR Privacy

As crypto-currencies make their way into the mainstream of the world, privacy is of an increasing concern. What is accepted by vendors one day can be illegal to own the next. Stealth provides an end-to-end privacy solution by leveraging a mix of exclusive features including a seamless TOR network integration for private transactions plus blockchain and address obfuscation cryptography found only in Stealth. The TOR network has proven that it is secure from network analysis and is the standard for keeping your network traffic private.

Identity Protection

Anonymity is and will always be our top priority. Stealth is dedicated to keep your coins private by using advanced cryptographic protection features for your information. We’ll continue to innovate to remain the most advanced private currency on the internet.

Stealth’s code and deployment has been audited and the lead developer has been verified by trusted third-parties including CryptoCertify.

Download Stealth Desktop Client

Fast. Secure. Reliable.

The latest version is v.2.2.0.0. For full source please got to Downloads or visit Github.
The bootstrap.dat works for any version and is current as of block 2,611,000. You will need the 7zip utility to unpack the bootstrap archive.